• Shuffle
    Toggle On
    Toggle Off
  • Alphabetize
    Toggle On
    Toggle Off
  • Front First
    Toggle On
    Toggle Off
  • Both Sides
    Toggle On
    Toggle Off
  • Read
    Toggle On
    Toggle Off
Reading...
Front

Card Range To Study

through

image

Play button

image

Play button

image

Progress

1/39

Click to flip

Use LEFT and RIGHT arrow keys to navigate between flashcards;

Use UP and DOWN arrow keys to flip the card;

H to show hint;

A reads text to speech;

39 Cards in this Set

  • Front
  • Back
Why are weak passwords a significant problem in networks?
Because hackers can get in and cause problems
List three true measures of password quality.
Is it guessable? is it easy to remember? is it easy for others to remember?
What is using a dictionary attack?
It is using a long list of likely passwords in hopes of finding one that works.
List two types of bad passwords
anything short, anything in the dictionary
What do I reccomend for a password
initial of a familiar phrase
What is multi-factor authentication?
asking for several unrelated things to prove identity
How does rot13 work?
by replacing each letter by the one 13 letters away
How do you send a private message to Bob?
encrypt it with Bob public key
What is the purpose of encrypting a message?
Prevent others from understanding it
What is the purpose of signing a message?
Authentication
How do you sign a message?
by encrypting it with your private key
How does signing prove authorship?
Signing has a key unique to the author, and what only the author would know.
How can Bob send a private, authenticated message to Alice?
Encrypt it with Bob's private key to prove authorship. Encrypt the result with Alice's public key to provide privacy
Why are public-key systems special?
they allow secure connections to be established between computers that don't know each other
Why is RSA special?
because it can easily create good public keys
What is a prime number?
A number that has no factors
Why are prime numbers used in encryption?
Because it is easy to multiply two large prime numbers but it is difficult to find the original number
What does the RSA private key consist of?
Two large prime numbers
What does the RSA public key consist of?
product of two large prime numbers
If RSA is so great, why are other things used?
speed
Is http considered to be secure? Why?
no because it is not encrypted
Is https considered to be secure? Why?
Yes, the data is encrypted.
What does SSL stand for?
secure socket layer
What does TLS stand for?
transport layer security
How does SSL protect confidentiality of a TCP connection?
because the traffic data encrypted, and it can hide its meaning
What is an outside threat?
A threat by a machine outside of your LAN.
What is a botnet?
a bot-net is a collection of computers that are controlled by a hacker, usually without the owners knowledge
What are two things that botnets commonly used for?
sending spam and doing attacks
What does DDOS stand for?
Distributed Denial of Service
What is a zombie?
A computer on a botnet
What does PWN stand for?
Gain control over a machine.
What is an Inside Threat?
a threat by a machine inside of your LAN
What two things does the server mean?
it is a program that provides service and a computer where such a program runs.
How can firewalls mitigate network attacks against servers?
by only allowing requests based on IP address and port
How can firewalls mitigate network attacks against clients?
by stopping unexpected traffic from entering your LAN
What does DMZ stand for?
Demilitarized Zone
What service does DMZ provide?
it directs all unexpected traffic on all ports to a designated machine
What service does port forwarding provide?
it directs unexpected network traffic from a few ports to a designated machine
How can sharing your Wi-Fi be dangerous?
bad people can directly get into your LAN. this bypasses your main firewall